Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Advertising
Display: short descriptions | full descriptions
  • The MD5 Com Component creates an RFC1321 compliant MD5 string from a string of text or file content, The MD5 algorithm takes as input a string of arbitrary length and produces as output a 128-bit "fingerprint" or "message digest" of the input string. It is conjectured that it is computationally infeasible to produce two messages having the same message digest, or to produce any message having a given prespecified target message digest.
  • Protect private and sensitive data from potential unauthorized access. The main features:1.Full characters of virtual USB Flash memory disk and function of plug and play.2.Unlimited volume and free choice of the volume of Virtual Flash Drive.3.Method of Encryption algorithm: DES, MD5, free choice of user on the encrypting degree. 4.Possibility to support 4 independent Virtual Flash Drives.
  • XP file backup tool backup files at convenient time and restores files from backup copy. DVD-R, DVD+R, DVD-RW or DVD+RW compatible media and corresponding devices can be used to store data. It supports different type of backup storage including FTP, removable media and all types of LANs. It gives ability to store multiple versions of backup files with timestamps and generates activity log in RTF format with option to automatically ZIP old log files. It creates backup of several folders or files at same time with MD4/MD5 password support for FTP backups. Removable disk backup copy files between laptop or notebook computer and desktop computer keeping all important files updated on both systems. It synchronizes files on two computers to bring them to same state and provides option to Import/export all settings and registration status.
  • Japplis Toolbox is a compilation of text utilities in one application. It can encode and decode URL, Base64, Hex, SoundEx or Metaphone. It can convert numbers from/to binary, octal, decimal, hexadecimal and to date. It gives you text information such as character count, word count, MD5 or SHA. You can get Java system properties, environment variables or Swing default values. It checks and finds regular expressions. It runs on Windows, Mac OS X and Linux. You can also run it online as Applet.
  • NoClone - file mangement utility software to find and delete TRUE duplicate files Features: * True Byte-to-byte comparison , not by CRC/MD5. Why most accurate? http://support.reasonablesw.com/forums/94/ShowPost.aspx * Search duplicate files contents and similar files regardless of file name * Search duplicate pictures (jpg, gif), video (avi, mpg), songs(mp3) , DLLs, Office documents(xls, doc, ppt, pub), pdf and any file types * Search files with same contents, same name. Benefits: * Clean up hard disks, identify and recover wasted disk space * Reduce backup time and media used for backups, * Reduce file searching time, minimize time used to unneeded virus scanning * Obtain more free space on "limited" resources, like notebooks * Remove duplicate files to eliminate synchronization problem * Organize files neat and manage files better * Cheaper than buying a new hard drive, so don't buy new hard drive, buy NoClone. ...
  • ID Harddisk Cleaner is a utility program, specifically designed to clean-up and organize your disk space. It removes useless, garbage files, as well as duplicated ones which inhibit system efficiency. Main features includes: cleaning your disk's available space, searching for useless garbage items, removing duplicated and zero-length files, restoring for deleted files at your request, MD5 Checksum capabilities.
  • Protect your website from unauthorized changes (hacking). Protects against defacement (visible changes) and malware (invisible changes) via date change and/or MD5 hash of all files on your site. Application is free, without restriction and contains no adverting or other annoyances. Source code available for nominal charge.
  • FreeKapture v2.00 - 16th July 2007 FreeKapture is a Freeware TWAIN image capture utility from TSoft (MidWavi Pro - MD5 Checker) that should work on any Windows (98 and on) TWAIN compliant system. TWAIN is, allegedly, an acronym for Technology Without An Interesting Name and is software (a driver) supplied by the manufacturer of TWAIN complaint devices. Using this driver, FreeKapture is able to scan, save, copy to the Windows Clipboard and print your images (photographs etc.). Save your image as a GIF, compressed JPG or a lossless BMP. Comes complete with a Help file and Setup (install/uninstall) program. Can also optimise a JPEG for size/quality output. You can also use FreeKapture as an 'ad hoc' copy machine (by using your printer drivers 'how many copies to print' option). The following was used during the preparation of the included Help file: Windows XP Pro SP2 An Epson USB Scanner An HP Photosmart USB Printer Unless you are using the sa ...
  • FreeOTFE4PDA is a free, open source, "on-the-fly" (OTFE) transparent disk encryption program. Using this software, you can create one or more "virtual memory cards" on your PDA - anything written to which will be automatically, and securely, encrypted before being stored. Features include: - Source code freely available - Easy to use; full wizard included for creating new volumes - Powerful: Supports numerous hash/encryption algorithms, and provides a greater level of flexibility than a number of other (including commercial!) OTFE systems - Hash algorithms include: MD5, SHA-512, RIPEMD-160, Tiger and many more - Cyphers include AES (256 bit), Twofish (256 bit), Blowfish (448 bit), Serpent (256 bit) and many more - "Hidden" volumes may be concealed within other FreeOTFE volumes, providing "plausible deniability" - Encrypted volumes have no "signature" to allow them to be identified as such - Modula ...
  • FreeOTFE is a free, open source, "on-the-fly" (OTFE) transparent disk encryption program. Using this software, you can create one or more "virtual disks" on your PC - anything written to which will be automatically, and securely, encrypted before being stored. Features include: - Source code freely available. - Easy to use; full wizard included for creating new volumes. - Data encrypted on your PC can be read/written on your PDA, and vice versa. - Powerful: Supports numerous hash/encryption algorithms, and provides a greater level of flexibility than a number of other (including commercial!) OTFE systems. - Hash algorithms include: MD5, SHA-512, RIPEMD-160, Tiger and many more. - Cyphers include AES (256 bit), Twofish (256 bit), Blowfish (448 bit), Serpent (256 bit) and many more. - "Portable mode" included; FreeOTFE doesn't need to be installed before it can be used - making it ideal for carrying your data securely on USB dr ...
  • The program CryptoLead will protect fast and effectively your files from immodest and curious looks. Make up the password, click on the right mouse button on the file icon, select item "Encrypt with CryptoLead" and encrypt the file very fast! CryptoLead will always stand guard over your secrets! CryptoLead encrypts the files using the strong algorithms, such as RSA, RC4, MD5, GOST 28147-89 and so on. CryptoLead is distributed free.
  • Business, or Network version of innovative password management software Arovax TraySafe allows to forget password problems of small offices or whole corporations. There are a lot of password keeping solutions nowadays, however none of them can be compared to TraySafe password manager in terms of safety and convenience. Network password management meets the requirements of any corporate network security policy. This program shares common passwords between users; it is able to specify access permission for each password per each user. Also, users can save their personal passwords on the server and protect them even for case of disaster. They can forget passwords and they will not lose them. There is no other password management tool, which could compete to TraySafe in security level. Arovax TraySafe offers a wide choice of world's most secure encryption and hash algorithms, like 3DES, Blowfish, SHA, MD5. Currently it supports 19 encryption algorithms to protect password files and 10 hash algorithms to ge ...
  • Windows registry files can have thousands upon thousands of entries. Viewing, analyzing, and reporting on these files can be a daunting task. Registry Analyzer is a comprehensive computer forensic analysis tool for analyzing Windows registry entries. FEATURES: Compatible with Paraben's P2 Examination Technology. Hash value verification: MD5, MD4, & SHA1. Load multiple registries. Bookmarking. Advanced searching options. HT ML reporting & more.
  • Paraben's P2 eXplorer allows you to mount a forensic image (or Linux DD, RAW, or other drive images) and explore it as though it were a drive on your machine while preserving the forensic nature of your evidence. This means that an image isn't just mounted to view logical files, it is mounted as the actual bitstream image, preserving unallocated, slack, and deleted data. FEATURES: Mounts Paraben's Forensic Replicator images (PFR). Mounts compressed & encrypted PFR images. Mounts EnCase images. Mounts SafeBack 1 & 2 images. Mounts WinImage non-compressed images. Mounts RAW images from Linux DD & other tools. Supports Dynamic drive images. Auto-detects image format. Supports both logical and physical images types. MD5 hash verification. Shell support for easy mounting/unmounting. Write-protection for preserving evidence. MD5 checksum verification. Supports mounting over a network. Mount several images at a time.
  • Forensically analyze PDA & cell phone data. Supports Palm, Windows CE/Mobile, BlackBerry, & Psion devices as well as certain Nokia, Sony Ericsson, Motorola, Siemens, LG, Samsung, & Symbian based phone models. Also supports GSM SIM card aqcuisition. Focuses on the physical level of acquisition offering more physical downloads of devices. The physical acquisition plug-in offers memory imaging on most of the devices supported in Device Seizure. Logical data acquisitions can?t acquire more data than the device Operating System was designed to allow. Features include: Comprehensive easy-to-use interface, USB and serial support, Comprehensive data acquisition of text messages, address books, call logs, and more, Recovers deleted data, Verification of file integrity with use of MD5 and SHA1 hash values, Built-in file viewing of proprietary files, Multi-language (Unicode) support for languages such as Arabic, Russian, Chinese, etc., Built-in searching and bookmarking, Text and Hex viewing options availabl ...
  • Recover passwords for over 30 applications. This advanced password recovery suite recovers passwords for Office, Excel, Word, Windows XP/2000/NT, Access, Outlook, Outlook Express, Exchange, WinZip, PKZip, ZIP, VBA Visual Basic modules, Internet Explorer, Acrobat, Quicken, QuickBooks, Lotus 1-2-3, Lotus Organizer, Lotus WordPro, Backup, Project, MYOB, Paradox, ACT!, Mail, Schedule+, Money, WordPerfect, Filemaker, Peachtree Accounting. Utilizes MD5 Hash Verification for forensic integrity. Simple, easy-to-use interface - just drag and drop file to be recovered. Lists most recent files recovered. HTML reporting of recovery results. Password cache for quick recovery of repeat passwords.
  • PasswordZilla is a powerful password and hash generator for any your projects. It's interface is simple, and easy to comprehend. PasswordZilla allows you to easily generate and store passwords, hash and data in a different formats. It will be helpful for webmasters, system administrators, software developers. PasswordZilla support next hash: MD5, MD4, MD2, CRC32, SAH128, SAH256, SAH384, SAH512, GostHash. Also, it has helpful Hash Calculator and advanced Template Editor. You'll love it, try now!
  • MD5 Password is a password recovery tool that can recover a password if you know its MD5 hash. MD5 Password features highly configurable and fast recovery engine that can process up to 32,000 hashes simultaneously. Brute-Force Attack, Dictionary Attack, Hybrid Dictionary Attack and Smart Force Attack are supported. The support for the distributed recovery technology allows you to utilize the power of multiple computers.
  • CYPHER MILLENIUM 6 PROFESSIONAL EDITION is the easier and powerfull e-mail and files encryption tool. Features: 85%-400% faster than the previous version! Rijndael, Twofish, DS2, Blowfish, GOST and RC4 algorithms; includes Paranoia Keyboard(c) secure virtual device; encodes/decodes mail using COPY & PASTE; allows to mix open text and encoded block in the same message; SmartSearch locates automatically the encoded block in message; Automatic Digital Signature; Integrity-Check using SHA256 and MD5; true SecretKey not recorded anyway; SecretKeys expansion and pre-encoding; ultimate WipeFile; random-algorithm; configurable ZIP-compression; Files-Lists (w/Integrity-Check too) to daily operations; configurable mail-blocking; Access Password; full compatible with ANY mailer and file; total MS-Explorer integration, Customized Warning messages, and MUCH MORE!
  • DupeWatcher is profile based powerful and handy duplicate file finder for Windows. It can detect identical files irrespective of file names using CRC32 or MD5 content match algorithms. This will help users to detect duplicate music or graphic files etc very easily. DupeWatcher can also detect duplicate files based on the file name, file size, file created or modified datetime. It comes with a pre-configured default profile with most common settings. It has option to exclude System, Read-only, Hidden files and zero byte files from duplicate search. A powerful filter option helps the user to include or exclude specific file groups or file types or file extensions from the identical file search. It also has an option to restrict duplicate file search to selected folder or to include sub folders. The user can execute a profile to find duplicate files in the system based on the selection criteria. On executing, the duplicate files detected and the results are displayed in a grid. The result is grouped based ...
  • Simple utility to create checksum files based on the MD5 hash routine. Recursively scans a selected folder and creates the checkfile data which can then be loaded in for testing to determine if the files have changed at all. Great for putting in the root folder of a CD-ROM to make sure the disc isn't defective when it is burned or mass produced.
  • CryptoTools is a multi-language suite of encryption components and libraries. CryptoTools provides DES and TripleDES encryption, as well as Base64 encoding and MD5 hashing capabilities. CryptoTools supports the following major languages C (win32), C++, ActiveX/COM, .Net and Java. Components for all languages are available in one single package.
  • AcuteFinder is a handy utility that finds duplicate files on your computer. You can then delete or move the files to an archive directory, saving a lot of disk space. Uses CRC32 and MD5 to find identical files, with an option to search in ZIP-files also. List of duplicate files can be sorted, printed, exported and acted upon. Fast and easy way to clean up your disks. Built-in file viewer for images and text. Free trial-key on request.
  • With CommuniCrypt QuickHasher you can create a Hash value of a file or verify the authenticity of a file with an existing hash value. QuickHasher uses the modern SHA-2 Hash with 256 bit. The outdated MD5 is not supported. Requires VB6 runtime!
Advertising

Page 3 of 4
1 2 3 4


Legal disclaimer | Privacy policy

© 2004-2021 IT Shareware